NewSEC504: Hacker Tools, Techniques, Exploits, and Incident Handling | | | | | | | | |
NewSEC503: Intrusion Detection In-Depth | | | | | | | | |
NewFOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques | | | | | | | | |
NewFOR508: Advanced Digital Forensics, Incident Response, and Threat Hunting | | | | | | | | |
NewSEC617: Wireless Penetration Testing and Ethical Hacking | | | | | | | | |
NewSEC642: Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques | | | | | | | | |
NewSEC573: Automating Information Security with Python | | | | | | | | |
NewFOR572: Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response | | | | | | | | |
NewDEV534: Secure DevOps: A Practical Introduction | | | | | | | | |
SEC401: Security Essentials Bootcamp Style | | | | | | | | |
SEC560: Network Penetration Testing and Ethical Hacking | | | | | | | | |
FOR500: Windows Forensic Analysis | | | | | | | | |
SEC542: Web App Penetration Testing and Ethical Hacking | | | | | | | | |
MGT512: SANS Security Leadership Essentials For Managers with Knowledge Compression™ | | | | | | | | |
MGT414: SANS Training Program for CISSP® Certification | | | | | | | | |
SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking | | | | | | | | |
SEC505: Securing Windows and PowerShell Automation | | | | | | | | |
AUD507: Auditing & Monitoring Networks, Perimeters & Systems | | | | | | | | |
SEC501: Advanced Security Essentials - Enterprise Defender | | | | | | | | |
SEC566: Implementing and Auditing the Critical Security Controls - In-Depth | | | | | | | | |
SEC575: Mobile Device Security and Ethical Hacking | | | | | | | | |
SEC301: Intro to Information Security | | | | | | | | |
SEC522: Defending Web Applications Security Essentials | | | | | | | | |
LEG523: Law of Data Security and Investigations | | | | | | | | |
AUD440: Critical Security Controls: Planning, Implementing, and Auditing | | | | | | | | |
MGT525: IT Project Management, Effective Communication, and PMP® Exam Prep | | | | | | | | |
MGT514: IT Security Strategic Planning, Policy, and Leadership | | | | | | | | |
MGT433: Securing The Human: How to Build, Maintain and Measure a High-Impact Awareness Program | | | | | | | | |
SEC580: Metasploit Kung Fu for Enterprise Pen Testing | | | | | | | | |
SEC511: Continuous Monitoring and Security Operations | | | | | | | | |
WaitlistSEC555: SIEM with Tactical Analytics | | | | | | | | |
SEC760: Advanced Exploit Development for Penetration Testers | | | | | | | | |
FOR518: Mac Forensic Analysis | | | | | | | | |
FOR578: Cyber Threat Intelligence | | | | | | | | |
FOR585: Advanced Smartphone Forensics | | | | | | | | |
MGT415: A Practical Introduction to Cyber Security Risk Management | | | | | | | | |
WaitlistICS410: ICS/SCADA Security Essentials | | | | | | | | |
HOSTED: Physical Security Specialist - Full Comprehensive Edition | | | | | | | | |
Core NetWars Tournament | | | | | | | | |
Cyber Defense NetWars Tournament | | | | | | | | |
DFIR NetWars Tournament | | | | | | | | |
Actionable Detects: Blue Team Cyber Defense Tactics Instructor: Seth Misenar | | | | | | | | |
Anti-Ransomware Instructor: G. Mark Hardy | | | | | | | | |
Be the Cheat Sheet. Know Memory. Instructor: Alissa Torres | | | | | | | | |
Control Things Platform Instructor: Justin Searle | | | | | | | | |
Don't Always Judge a Packet by Its Cover Instructor: Gabriel Sanchez, Master's Degree Candidate | | | | | | | | |
General Session - Welcome to SANS Instructor: Bryan Simon | | | | | | | | |
GIAC Program Presentation Instructor: Jeff Frisk | | | | | | | | |
Increase Network Visibility: Methods to Feed IDS Sensors Instructor: Brandon Peterson, Master's Degree Candidate | | | | | | | | |
Industrial Control System Active Defense and Threat Intelligence Instructor: Robert M. Lee | | | | | | | | |
Introducing DeepBlueCLI, a PowerShell Module for Hunt Teaming via Windows Event Logs Instructor: Eric Conrad | | | | | | | | |
Introduction to Reversing with IDA Instructor: Stephen Sims | | | | | | | | |
Lets Go Hunting Bad Guys. Instructor: John Strand | | | | | | | | |
Malware Analysis for Incident Responders: Getting Started Instructor: Lenny Zeltser | | | | | | | | |
Privacy and Legal Dimensions in Increasingly Connected Digital World Instructor: Muzamil Riffat, Master's Degree Candidate | | | | | | | | |
Secure DevOps: Static Analysis & the Puma’s Tail Instructor: Eric Johnson | | | | | | | | |
Securing Your Kids Instructor: Lance Spitzner | | | | | | | | |
Selling Your Information Security Strategy Instructor: David Todd, Master's Degree Candidate | | | | | | | | |
Smartphone and Network Forensics Goes Together Like Peas and Carrots Instructor: Heather Mahalik and Phil Hagen | | | | | | | | |
So, You Wanna be a Pentester? Instructor: Adrien de Beaupre | | | | | | | | |
Stuck in the Box, a SIEM's Tale Instructor: Justin Henderson | | | | | | | | |
Ten Tenets of CISO Success Instructor: Frank Kim | | | | | | | | |
The 14 Absolute Truths of Security Instructor: Keith Palmgren | | | | | | | | |
The Seven Deadly Sins of Incident Response Instructor: Jake Williams | | | | | | | | |
The Three Cs to Building a Mature Awareness Program Instructor: Lance Spitzner | | | | | | | | |
Three Keys to Mobile Security: Are You Doing Everything You Can to Protect Your Apps? Instructor: Gregory Leonard | | | | | | | | |
Women's CONNECT Event Instructor: Hosted by SANS COINS program and ISSA WIS SIG | | | | | | | | |
You've Got Ransomware! Managing the Legal Risk of Cyber Fraud Instructor: Benjamin Wright | | | | | | | | |